neural-hash-collider VS owasp-mstg

Compare neural-hash-collider vs owasp-mstg and see what are their differences.

neural-hash-collider

Preimage attack against NeuralHash 💣 (by anishathalye)

owasp-mstg

The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering. (by julepka)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
neural-hash-collider owasp-mstg
37 1
651 0
- -
1.2 10.0
about 1 year ago almost 2 years ago
Python
MIT License Creative Commons Attribution Share Alike 4.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

neural-hash-collider

Posts with mentions or reviews of neural-hash-collider. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-27.

owasp-mstg

Posts with mentions or reviews of owasp-mstg. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-11-03.
  • Google Play rolls out an "Independent security review" badge for apps
    2 projects | news.ycombinator.com | 3 Nov 2023
    I found a more detailed explanation of it: https://github.com/julepka/owasp-mstg/blob/master/Document/0...

    > Generally, you should provide compiled code with as little explanation as possible. Some metadata, such as debugging information, line numbers, and descriptive function or method names, make the binary or bytecode easier for the reverse engineer to understand, but these aren't needed in a release build and can therefore be safely omitted without impacting the app's functionality.

    I'm not a big fan of the reasoning, as it's security through obscurity. Which is not the worst tradeoff, but these days it just makes public bug bounties (and other public auditing) end up being less of an interesting prospect for improving security.

What are some alternatives?

When comparing neural-hash-collider and owasp-mstg you can also consider the following projects:

hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.

buildAPKs - Really quickly build APKs on handheld device (smartphone or tablet) in Amazon, Android, Chromebook and Windows📲 See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.

neuralhash-collisions - A catalog of naturally occurring images whose Apple NeuralHash is identical.

android-udev-rules - Android udev rules list aimed to be the most comprehensive on the net

json - JSON for Modern C++

website - The elementary.io website

harbormaster

reFlutter - Flutter Reverse Engineering Framework

glodroid_manifest - Android port that aims to bring both user- and developer-friendly experience in using AOSP with a set of single-board computers (SBC), phones and other devices.

owasp-masvs - The OWASP MASVS (Mobile Application Security Verification Standard) is the industry standard for mobile app security.

AppleNeuralHash2ONNX - Convert Apple NeuralHash model for CSAM Detection to ONNX.

theos-jailed - A Theos module to develop jailed tweaks for iOS 8 and up